{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:25:28Z","timestamp":1755926728038,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC","award":["62172200"],"award-info":[{"award-number":["62172200"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3556957","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["VITAS : Guided Model-based VUI Testing of VPA Apps"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1202-0220","authenticated-orcid":false,"given":"Suwan","family":"Li","sequence":"first","affiliation":[{"name":"State Key Laboratory of Novel Software Technology, Nanjing University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0517-7801","authenticated-orcid":false,"given":"Lei","family":"Bu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Novel Software Technology, Nanjing University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6390-9890","authenticated-orcid":false,"given":"Guangdong","family":"Bai","sequence":"additional","affiliation":[{"name":"University of Queensland, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0107-3522","authenticated-orcid":false,"given":"Zhixiu","family":"Guo","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5624-2987","authenticated-orcid":false,"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China, China"}]},{"given":"Hanlin","family":"Wei","sequence":"additional","affiliation":[{"name":"University of Queensland, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. Amazon.com: Alexa.https:\/\/www.amazon.com\/b?node=21576558011."},{"key":"e_1_3_2_1_2_1","unstructured":"2016. Google Assistant your own personal Google.https:\/\/assistant.google.com."},{"key":"e_1_3_2_1_3_1","unstructured":"2017. Alexa Simulator limitations. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/devconsole\/test-your-skill.html##use-simulator."},{"key":"e_1_3_2_1_4_1","unstructured":"2017. Amazon.com: Alexa Skills. https:\/\/www.amazon.com\/s?i=alexa-skills."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Portland Family Says Their Amazon Alexa Recorded Private Conversations.https:\/\/www.wweek.com\/news\/2018\/05\/26\/portland-family-says-their-amazon-alexa-recorded-private-conversations-and-sent-them-to-a-random-contact-in-seattle\/."},{"volume-title":"Total number of Amazon Alexa skills from","year":"2016","key":"e_1_3_2_1_6_1","unstructured":"2019. Total number of Amazon Alexa skills from January 2016 to September 2019.https:\/\/www.statista.com\/statistics\/912856\/amazon-alexa-skills-growth."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. Industrial-Strength Natural Language Processings. https:\/\/spacy.io"},{"key":"e_1_3_2_1_8_1","unstructured":"2021. Scenes|Conversational Actions|Google Developers. https:\/\/developers.google.com\/assistant\/conversational\/scenes."},{"key":"e_1_3_2_1_9_1","unstructured":"2021. Simulator|Actions console|Google Developers. https:\/\/developers.google.com\/assistant\/console\/simulator."},{"key":"e_1_3_2_1_10_1","unstructured":"2022. Vitas. https:\/\/vitas000.github.io\/tool\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351717"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.55"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970313"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423339"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1978.231496"},{"key":"e_1_3_2_1_16_1","first-page":"1508","article-title":"Fault Coverage-Driven Incremental Test","volume":"53","author":"da Silva\u00a0Sim\u00e3o Adenilso","year":"2010","unstructured":"Adenilso da Silva\u00a0Sim\u00e3o and Alexandre Petrenko. 2010. Fault Coverage-Driven Incremental Test Generation. Comput. J. 53, 9 (2010), 1508\u20131522.","journal-title":"Generation. Comput. J."},{"key":"e_1_3_2_1_17_1","volume-title":"TESTCOM 2009 and 9th International Workshop, FATES 2009, Eindhoven, The Netherlands, November 2-4, 2009. Proceedings(Lecture Notes in Computer Science, Vol.\u00a05826)","author":"da Silva\u00a0Sim\u00e3o Adenilso","year":"2009","unstructured":"Adenilso da Silva\u00a0Sim\u00e3o, Alexandre Petrenko, and Nina Yevtushenko. 2009. Generating Reduced Tests for FSMs with Extra States. In Testing of Software and Communication Systems, 21st IFIP WG 6.1 International Conference, TESTCOM 2009 and 9th International Workshop, FATES 2009, Eindhoven, The Netherlands, November 2-4, 2009. Proceedings(Lecture Notes in Computer Science, Vol.\u00a05826), Manuel N\u00fa\u00f1ez, Paul Baker, and Mercedes\u00a0G. Merayo (Eds.). Springer, 129\u2013145."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302640"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11562436_16"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-018-1174-x"},{"key":"e_1_3_2_1_21_1","volume-title":"SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium, USENIX Security 2020","author":"Guo Zhixiu","year":"2020","unstructured":"Zhixiu Guo, Zijin Lin, Pan Li, and Kai Chen. 2020. SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association, 2649\u20132666."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.030"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.030"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220410410560573"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3077518"},{"key":"e_1_3_2_1_26_1","volume-title":"Skill Squatting Attacks on Amazon Alexa. In 27th USENIX Security Symposium, USENIX Security 2018","author":"Kumar Deepak","year":"2018","unstructured":"Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, and Michael Bailey. 2018. Skill Squatting Attacks on Amazon Alexa. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018, William Enck and Adrienne\u00a0Porter Felt (Eds.). USENIX Association, 33\u201347."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/503209.503244"},{"key":"e_1_3_2_1_28_1","volume-title":"T-UPPAAL: Online Model-based Testing of Real-Time Systems. In 19th IEEE International Conference on Automated Software Engineering (ASE 2004)","author":"Mikucionis Marius","year":"2004","unstructured":"Marius Mikucionis, Kim\u00a0Guldstrand Larsen, and Brian Nielsen. 2004. T-UPPAAL: Online Model-based Testing of Real-Time Systems. In 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 20-25 September 2004, Linz, Austria. IEEE Computer Society, 396\u2013397."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970316"},{"key":"e_1_3_2_1_30_1","unstructured":"Muhammad Shafique and Yvan Labiche. 2010. A systematic review of model based testing tool support. SCE Technical Reports(2010)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106298"},{"key":"e_1_3_2_1_32_1","volume-title":"Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps. In 37th IEEE\/ACM International Conference on Automated Software Engineering (ASE \u201922)","author":"Xie Fuman","year":"2022","unstructured":"Fuman Xie, Yanjun Zhang, Chuan Yan, Suwan Li, Lei Bu, Kai Chen, Zi Huang, and Guangdong Bai. 2022. Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps. In 37th IEEE\/ACM International Conference on Automated Software Engineering (ASE \u201922)."},{"key":"e_1_3_2_1_33_1","volume-title":"Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems. In 2019 IEEE Symposium on Security and Privacy, SP 2019","author":"Zhang Nan","year":"2019","unstructured":"Nan Zhang, Xianghang Mi, Xuan Feng, XiaoFeng Wang, Yuan Tian, and Feng Qian. 2019. Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019. IEEE, 1381\u20131396."},{"key":"e_1_3_2_1_34_1","volume-title":"Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems","author":"Zhang Nan","year":"2019","unstructured":"Nan Zhang, Xianghang Mi, Xuan Feng, Xiao\u00a0Feng Wang, Yuan Tian, and Feng Qian. 2019. Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems.IEEE Symposium on Security and Privacy(2019)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23525"}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","acronym":"ASE '22","location":"Rochester MI USA"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3556957","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3556957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T07:57:09Z","timestamp":1755849429000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3556957"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":35,"alternative-id":["10.1145\/3551349.3556957","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3556957","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}